US20140079076A1 - Segmentation and reassembly of network packets - Google Patents
Segmentation and reassembly of network packets Download PDFInfo
- Publication number
- US20140079076A1 US20140079076A1 US13/619,283 US201213619283A US2014079076A1 US 20140079076 A1 US20140079076 A1 US 20140079076A1 US 201213619283 A US201213619283 A US 201213619283A US 2014079076 A1 US2014079076 A1 US 2014079076A1
- Authority
- US
- United States
- Prior art keywords
- packet
- reassembly
- fragment
- fragments
- incoming
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/90—Buffering arrangements
- H04L49/9057—Arrangements for supporting packet reassembly or resequencing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0078—Avoidance of errors by organising the transmitted data in a format specifically designed to deal with errors, e.g. location
- H04L1/0083—Formatting with frames or packets; Protocol or part of protocol for error control
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- 1. Field of the Invention
- The present invention relates generally to packet processing, and in particular, to packet segmentation and reassembly in information technology networks.
- 2. Description of Related Art
- In information technology networks, switching devices direct packets. A switching device redirects incoming data on one network node, out to another network node. Latency in such a network includes the time required for a packet to traverse the network from a source (transmitter) to a destination (receiver). One component of latency involves segmentation and reassembly of network packets in a networking switch.
- A segmentation module performs segmentation of network packets. Segmentation comprises fragmenting a packet, such as a variable length packet, into fixed packet fragments to be transported across a network. Thereafter, the packet fragments are reassembled to reconstitute the original packet.
- All the fragments of specific packets are called member packet fragments of that packet. A header is provided for each packet fragment. The header is formed from packet pre-classification information added by an ingress packet processor. A packet context is a buffer (i.e., packet buffer context) where member packet fragments which completely match the criteria of membership of a packet are put together. Logic to perform segmentation and reassembly is time consuming and adds significant latency in packet forwarding in the network.
- Embodiments of the invention relate to packet processing including processing of packets in packet networks in distributed information technology environments. One embodiment comprises segmentation and reassembly of network packets for reducing data communication latency in packet networks. One embodiment comprises segmentation of a packet into fragments and reassembly of the fragments for a given packet buffer context, in a packet-based distributed system.
- According to embodiments of the invention, a process for reassembly of fragments into a packet comprises receiving an incoming fragment of a packet from a packet network wherein each fragment comprises a segment of the packet and a header, generating a reassembly key using selected information from the incoming fragment header wherein the selected information is the same for all fragments of the packet, checking a reassembly table in a content addressable memory to find an entry that includes a logic key matching the reassembly key, and using a content index in the found entry and a sequence number of the incoming fragment within the packet, to determine a location offset in a reassembly buffer area for storing the incoming fragment at said location offset in the reassembly buffer area for the packet for reassembly.
- The reassembly process further includes maintaining a reassembly table in a content addressable memory, wherein the reassembly table includes one or more entries corresponding to one or more packets, and wherein each entry comprises a logic key for a corresponding packet and a content index into a reassembly buffer area for storing incoming fragments of that packet.
- Maintaining the reassembly table includes, in response to an incoming fragment of a packet, if the incoming fragment is a Start of packet (SOP) fragment of a packet or if the incoming fragment lookup key is not found in the reassembly table, generating a new logic key using selected information from the incoming fragment header wherein the selected information is the same for all fragments of the packet, allocating an area of the reassembly buffer for storing fragments of the packet, and placing a new entry into the reassembly table. The new entry includes said new logic key and a new content index into the reassembly buffer area for storing incoming fragments of that packet.
- The packet is reassembled using the stored fragments in the reassembly buffer area for the packet using fragment offset number or sequence number from packet header. The fragment offset number with respect to the packet is unique for each fragment. The fragment offset number or sequence number is not included in the reassembly key formation. The network comprises an Internet Protocol (IP) network in a distributed information technology environment.
- These and other aspects, features and advantages of the invention will be understood with reference to the drawing figures, and detailed description herein, and will be realized by means of the various elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following brief description of the drawings and detailed description of the invention are exemplary and explanatory of preferred embodiments of the invention, and are not restrictive of the invention, as claimed.
- The subject matter which is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
-
FIG. 1 is a block diagram illustrating an example information technology system utilizing packet processing, according to an embodiment of the present invention; -
FIG. 2 is a block diagram illustrating an example of a computing system utilizing a packet processing system, according to an embodiment of the present invention; -
FIG. 3A is a block diagram illustrating an example of a packet processing system, according to an embodiment of the present invention; -
FIG. 3B is a block diagram illustrating an example of a packet processing system implemented in servers, according to an embodiment of the present invention; -
FIG. 4 is a block diagram illustrating an example reassembly module of a packet processing system, according to an embodiment of the present invention; -
FIG. 5A is a flowchart showing a segmentation (fragmentation) packet processing system operation, according to an embodiment of the invention; -
FIG. 5B is a flowchart showing a reassembly packet processing system operation, according to an embodiment of the invention; and -
FIG. 5C illustrates an Internet Protocol (IP) packet header. - The detailed description explains the preferred embodiments of the invention, together with advantages and features, by way of example with reference to the drawings.
- The present invention may be understood more readily by reference to the following detailed description of the invention taken in connection with the accompanying drawing figures, which form a part of this disclosure. It is to be understood that this invention is not limited to the specific devices, methods, conditions or parameters described and/or shown herein, and that the terminology used herein is for the purpose of describing particular embodiments by way of example only and is not intended to be limiting of the claimed invention. One or more exemplary embodiments of the invention are described below in detail. The disclosed embodiments are intended to be illustrative only since numerous modifications and variations therein will be apparent to those of ordinary skill in the art.
- Embodiments of the invention relate to packet processing including processing of network packets in information technology networks. One embodiment comprises low overhead segmentation and reassembly of packets, such as Internet Protocol (IP) packets, for reducing data communication latency.
- One embodiment comprises segmentation of a packet into member packet fragments and reassembly of the member packet fragments for a given packet buffer context. One embodiment of the invention provides Transmission Control Protocol (TCP) acceleration or packet fragmentation and reassembly for servers and other systems.
- According to an embodiment of the invention, a process for reassembly of fragments into a packet comprises obtaining a Start of packet (SOP) packet fragment or any first out of sequence packet fragment of a new packet, constructing an associated packet buffer context, receiving member packet fragments of that packet, copying the member packet fragments without headers and placing them in sequence in the packet buffer context, and after all the member packet fragments are in the buffer, providing content of the packet buffer context as the reassembled packet for further processing.
- Referring now to the drawings, example embodiments of the present invention are now described.
FIG. 1 illustrates an example of the basic components of aninformation technology system 10 utilizing packet processing, according to an embodiment of the present invention. Thesystem 10 includes aserver 11 and theremote devices 15 and 17-20 that utilize a packet processing system 100 (FIG. 2 ) implementing a packet processing method, according to an embodiment of the present invention. - Aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” For example, in one implementation packet processing according to an embodiment of the invention is implemented in software, as shown by solid-
line block 100 withinmemory 42 inFIG. 2 . In another example, packet processing according to an embodiment of the invention is implemented in hardware, as shown by the broken-line block 100 inFIG. 2 . - Each of the
remote devices 15 and 17-20 has applications and can have alocal database 16.Server 11 contains applications, and adatabase 12 that can be accessed byremote device 15 and 17-20 via connections 14(A-F), respectively, overnetwork 13. In one implementation, theserver 11 executes software for a computer network and controls access to itself anddatabase 12. - Illustrated in
FIG. 2 is a block diagram demonstrating an example ofserver 11, as shown inFIG. 1 , utilizing apacket processing system 100 according to an embodiment of the present invention. The packet processing system comprises asegmentation system 100S and areassembly system 100R, according to an embodiment of the invention. In one embodiment, thesegmentation system 100S implements segmentation of packets into member packet fragments, and thereassembly system 100R implements reassembly of member packet fragments into a packet, according to the invention. - The
remote devices 15 and 17-20 may access thedatabase 12 over anetwork 13, such as but not limited to: switched fabric network, the Internet, a local area network (LAN), a wide area network (WAN), via a telephone line using a modem (POTS), Bluetooth, WiFi, WiMAX, cellular, optical, satellite, radio frequency (RF), Ethernet, magnetic induction, coax, RS-485, the like or other like networks. Theserver 11 may also be connected to the LAN within an organization. - The
remote devices 15 and 17-20 may each be located at remote sites.Remote devices 15 and 17-20 include but are not limited to, PCs, workstations, laptops, handheld computers, pocket PCs, PDAs, pagers, WAP devices, non-WAP devices, cell phones, palm devices, printing devices and the like. When a user at one of theremote devices 15 and 17-20 desires to access data from thedatabase 12 at theserver 11, theremote device 15 and 17-20 communicates over thenetwork 13, to access theserver 11 anddatabase 12. Theserver 11 may comprise a Web server. Thenetwork 13 and connected devices (e.g.,computing systems - Data that are obtained from third
party computer systems 21 anddatabase 22 can be stored onserver 11 anddatabase 12 in order to provide later access to the user onremote devices 15 and 17-20. It is also contemplated that for certain types of data that theremote devices 15 and 17-20 can access the thirdparty computer systems 21 anddatabase 22 directly using thenetwork 13. - The
server 11 includes, but is not limited to, PCs, workstations, laptops, PDAs, palm devices and the like. The processing components of the third party computer systems are similar to that of the description for the server 11 (FIG. 2 ). Generally, in terms of hardware architecture, as shown inFIG. 2 , theserver 11 includes aprocessor 41, a computer readable medium such asmemory 42, and one or more input and/or output (I/O) devices (or peripherals) that are communicatively coupled via alocal interface 43. Thelocal interface 43 can be, for example but not limited to, one or more buses or other wired or wireless connections, as is known in the art. Thelocal interface 43 may have additional elements, which are omitted for simplicity, such as controllers, buffers (caches), drivers, repeaters, and receivers, to enable communications. Further, thelocal interface 43 may include address, control, and/or data connections to enable appropriate communications among the aforementioned components. - The
processor 41 is a hardware device for executing software that can be stored inmemory 42. Theprocessor 41 can be virtually any custom made or commercially available processor, a central processing unit (CPU), data signal processor (DSP) or an auxiliary processor among several processors associated with theserver 11, and a semiconductor based microprocessor (in the form of a microchip) or a microprocessor. - The
memory 42 can include any one or combination of volatile memory elements (e.g., random access memory (RAM), such as dynamic random access memory (DRAM), static random access memory (SRAM), etc.) and nonvolatile memory elements (e.g., read only memory (ROM), erasable programmable read only memory (EPROM), electronically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), tape, compact disc read only memory (CD-ROM), disk, diskette, cartridge, cassette or the like, etc.). Moreover, thememory 42 may incorporate electronic, magnetic, optical, and/or other types of storage media. Note that thememory 42 can have a distributed architecture, where various components are situated remote from one another, but can be accessed by theprocessor 41. - The software in
memory 42 may include one or more separate programs, each of which comprises an ordered listing of executable instructions for implementing logical functions. In the example illustrated inFIG. 2 , the software in thememory 42 includes a suitable operating system (O/S) 51 and thepacket processing system 100 of the present invention. Thepacket processing system 100 comprises functional components and process blocks described further below. - The O/S 51 essentially controls the execution of other computer programs, such as a communication stack including the
packet processing system 100, and provides scheduling, input/output control, file and data management, memory management, and communication control and related services. However, thepacket processing system 100 of the present invention is applicable on other operating systems. In one embodiment, thesegmentation system 100S sends packets to the O/S 51 via a Network Interface Card (NIC) 47. In one embodiment, the O/S 51 provides received packets to thesegmentation system 100R via theNIC 47 for reassembly. TheNIC 47 comprises processor, memory, logic and communication modules for processing packets. - The
packet processing system 100 may comprise a source program, executable program (object code), script, or any other entity comprising a set of computer program instructions to be performed. When thepacket processing system 100 is a source program, then the program is usually translated via a compiler, assembler, interpreter, or the like, which may or may not be included within thememory 42, so as to operate properly in connection with the O/S 51. Furthermore, thepacket processing system 100 can be written as (a) an object oriented programming language, which has classes of data and methods, or (b) a procedure programming language, which has routines, subroutines, and/or functions. The computer program instructions may execute entirely onserver 11, partly onserver 11, as a stand-alone software package, partly onserver 11 and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a LAN or a WAN, or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). - These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions, which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- The I/O devices may include input devices, for example but not limited to, a
mouse 44,keyboard 45, scanner (not shown), microphone (not shown), etc. Furthermore, the I/O devices may also include output devices, for example but not limited to, a printer (not shown),display 46, etc. Finally, the I/O devices may further include devices that communicate both inputs and outputs, for instance but not limited to, a NIC 47 (for accessing remote devices, other files, devices, systems, or a network, etc.). - If the
server 11 is a PC, workstation, intelligent device or the like, the software in thememory 42 may further include a basic input output system (BIOS) (omitted for simplicity). The BIOS is a set of essential software routines that initialize and test hardware at startup, start the O/S 51, and support the transfer of data among the hardware devices. The BIOS is stored in some type of read-only-memory, such as ROM, PROM, EPROM, EEPROM or the like, so that the BIOS can be executed when theserver 11 is activated. - When the
server 11 is in operation, theprocessor 41 is configured to execute software stored within thememory 42, to communicate data to and from thememory 42, and generally to control operations of theserver 11 pursuant to the software. Thepacket processing system 100 and the O/S 51 are read, in whole or in part, by theprocessor 41, perhaps buffered within theprocessor 41, and then executed. - When the
packet processing system 100 is implemented in software, it should be noted that thepacket processing system 100 can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. - As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- In the context of this document, a “computer-readable medium” can be any means that can store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, propagation medium, or other physical device or means that can contain or store a computer program for use by or in connection with a computer related system or method.
- More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic) having one or more wires, a portable computer diskette (magnetic or optical), a random access memory (RAM) (electronic), a read-only memory (ROM) (electronic), an erasable programmable read-only memory (EPROM, EEPROM, or Flash memory) (electronic), an optical fiber (optical), and a portable compact disc memory (CDROM, CD R/W) (optical). Note that the computer-readable medium could even be paper or another suitable medium, upon which the program is printed or punched (as in paper tape, punched cards, etc.), as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
- A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- When the
packet processing system 100 is implemented in hardware, thepacket processing system 100 can be implemented with any one or a combination of the following technologies, which are each well known in the art: a discrete logic circuit(s) having logic gates for implementing logic functions upon data signals, an application specific integrated circuit (ASIC) having appropriate combinational logic gates, a programmable gate array(s) (PGA), a field programmable gate array (FPGA), etc. -
Remote devices 15 and 17-20 provide access to thepacket processing system 100 of the present invention onserver 11 anddatabase 12 using for example, but not limited to an Internet browser. The information accessed inserver 11 anddatabase 12 can be provided in a number of different forms including but not limited to ASCII data, WEB page data (i.e., HTML), XML or other type of formatted data. As illustrated, theremote devices 15 and 17-20 are similar to the description of the components forserver 11 described with regard toFIG. 2 . Theremote devices 15 and 17-20 will be referred to asremote devices 15 for the sake of brevity. - Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- In one embodiment, the
packet processing system 100 may be implemented on at least two devices such assystem 15 andsystem 11, connected via acommunication link 13. Exemplary embodiments of thepacket processing system 100 according to the present invention are described herein below in relation to the example system 11 (FIG. 2 ), in conjunction with a segmentation andreassembly architecture 120 as shown inFIG. 3A . Asegmentation system 100S implements segmentation of packets into member packet fragments, and areassembly system 100R implements reassembly of member packet fragments into a packet, according to the invention. Asegmentation system 100S operates independent of areassembly system 100R.Multiple segmentation systems 100S may be connected to the network 110 (e.g., packet network). Similarly multiplereassembly systems 100R may be connected to thenetwork 110. As shown inFIG. 3B , in one embodiment, thesystem 100S is implemented in aNIC 111 of a host system such as Server A (i.e., source). In one embodiment, thesystem 100R is implemented in aNIC 112 of a host system such as Server B (i.e., destination). - Application source (Server A) generates large data blocks. A driver divides each data block into multiple fragments and the
NIC 111 sends the fragments out as Ethernet packets in a flow. Each packet has a destination address and transport protocol. In the switch, each packet is given a sequence number and fragment offset, and sent to the target (Server B). In theNIC 112, the received packet fragments are identified as fragments belonging to the same block, and reassembled. After reassembly the block is handed over to the application at Server B. In the example shown inFIG. 3B ,Packet 1=Packet 1A+Packet 1B. - To speed up the reassembly, according to the invention, the assembly algorithm uses the IP header of each received fragment for reassembly using sequence number and fragment offset. The reassembly mechanism identifies fragments for each context and performs reassembly. Normally, reassembly complexity is in the order of m×n wherein m is number of contexts, n is number of fragments per context. The invention reduces that complexity using TCAM acceleration for TCP acceleration to TCP offload NIC (or in OS kernel). First packet fragments may be Maximum Transfer Unit (MTU) size, but a last packet fragments might not be MTU size.
- Each
segmentation system 100S and eachreassembly system 100R communicate with anetwork 110. In one embodiment of the invention, thearchitecture 120 may be implemented across a distributed system (e.g., asegmentation system 100S incomputer system 15, thereassembly system 100R incomputer system 11,network 110 in network 13). In another embodiment of the invention, thearchitecture 120 may be implemented within a communication switch. - A
segmentation system 100S includes asegmentation module 101, a context table 102 and abuffer 103. Thesegmentation module 101 includes segmentation logic. The segmentation system 1005 receives packets, such as IP packets, wherein thesegmentation module 101 segments each packet into member packet fragments for transport over thenetwork 110, wherein thenetwork 110 routes each packet fragment to anappropriate reassembly system 100R for reassembly into a packet. A packet fragment comprises a header and a payload. The context table 102 provides the status of each received packet. - In one embodiment, the
segmentation module 101 segments an incoming packet according to MTU size. Common elements of the packet fragment header in a given packet can be saved inbuffer 103 as a common structure. As thesegmentation module 101 concatenates the packet fragment header to a packet fragment payload, the common structure may also be included, along with a (recalculated) sequence number and parity information for error correction. - Further, a
reassembly system 100R comprises areassembly module 104, a contentaddressable memory 106 such as a TCAM, and abuffer 107. TCAM is a ternary content addressable memory. With a content addressable memory, the data is provided to the content addressable memory, and the content addressable memory returns a list of addresses where the data is stored, if found. Content addressable memory searches the entire memory in one operation. When a generated reassembly key is provided to the TCAM and in one operation the TCAM returns an entry in the reassembly table where a matching logic key is stored, if found. The algorithmic complexity of TCAMs search algorithm is O(1). - For reassembly, matching a packet fragment to a packet is based on certain contexts. Each packet fragment context is checked and if it matches a buffer context the packet fragment belongs to, then the packet fragment is stored in that buffer context for reassembling a packet. A first packet fragments is received at the
NIC 112. Tuples are extracted from header except CRC, Fragment Offset, More Fragment Flag. TCAM search, O(1) complexity operation, returns context buffer index. Packet fragment payload is copied to a buffer according t the Fragment Offset. Resulting packet is copied into DMA buffer for Kernel use. -
FIG. 4 illustrates an example operation of thereassembly system 100R according to reassembly logic of thereassembly module 104. When a SOP packet fragment arrives at thereassembly system 100R, there is no context, and there is no content index in the TCAM table 133. As such, for a SOP packet fragment of a new packet, a newreassembly logic key 132, andcorresponding content index 135, is created and stored in a TCAM table 133. - A
reassembly logic key 132 for a packet fragment is created using tuples (i.e., ordered lists of elements) which are extracted from the packet fragment header elements. Important Header Fields for IP Fragmentation and Reassembly are as follows (FIG. 5C shows an example IPv4 Header Format): -
- 1. Total length: Total length of the payload.
- 2. Fragment Flags:
- bit 0: Reserved; must be zero,
- bit 1: Don't Fragment (DF),
- bit 2: More Fragments (MF).
- 3. More Fragments Flag: Set to 1 for all fragments except last fragment.
- 4. Fragment Offset: based on the offset of the segment in the original data payload. This is measured in units of eight-byte blocks.
- 5. Identification: 16 bit Id number of the IP packet.
- 6. CRC: Header checksum.
- Important NIC properties include MTU (Maximum Transfer Unit per IP interface), and Buffering capability.
- A sequence number of the packet fragment is not used in generating the
logic key 132. Thelogic key 132 is placed in a TCAM table 133 comprising a TCAM bank in theTCAM 106. Thelogic key 132 includes those elements of the packet fragment header that do not change across the different packet fragments in a given packet. The sequence number (i.e., the sequence of the packet fragment in a given packet) is not used to create thelogic key 132. - Further, a reassembly
packet buffer context 131 is constructed in thereassembly buffer 107 where the SOP packet fragment is stored. Thepacket buffer context 131 has an associatedcontent index 135 which indicates location of thepacket buffer context 131 in thebuffer 107. For eachlogic key 132 there is acorresponding content index 135 in the TCAM table 133. In one example, a content index X is associated with (or maps to) a first packet buffer context 131 (buffer segment), a content index Y is associated with (or maps to) a secondpacket buffer context 131, a content index Z is associated with (or maps to) a thirdpacket buffer context 131, etc. As such, each content index corresponds to apacket buffer context 131 where packet fragments of the same context are stored for reassembly purposes. - As such, for a
new logic key 132, the TCAM table 133 is also populated with acontent index 135 for a newpacket buffer context 131. For all subsequent packet fragments of a packet, TCAM table lookups for existing logic keys provide content indices of the already createdpacket buffer contexts 131. - Generally, the logic key serves as a way to lookup an index in the TCAM table for an
incoming packet fragment 130. The lookup logic finds context index of reassembly context (i.e., packet buffer context 131) for each incoming packet fragment based on context of that packet fragment. - Each packet fragment carries a sequence number which identifies its sequence in the packet. The sequence number is an offset into the associated
packet buffer context 131 where the packet fragment is stored. The sequence number is not part of the logic key. - A
logic key 132 is used as input to aTCAM lookup logic 134 for the TCAM table 133. For a givenlogic key 132, the TCAM lookup logic looks up acontent index 135 in the TCAM table, wherein the content index is an index into thebuffer 107 where apacket buffer context 131 for an incoming packet fragment resides. As such, thecontent index 135 are offsets into thebuffer 107 for thepacket buffer contexts 131 of incoming packet fragments (e.g.,fragment 0, . . . , fragment N). - As successive packet fragments arrive, logic keys are created using tuples. For example, as a packet fragment arrives into egress, tuples are extracted from the packet fragment header to create a logic key, and the logic key is used in the TCAM lookup table to lookup index of a
packet buffer context 131 associated with the packet fragment. Since this is a consecutive (or successive) packet fragment (not a SOP) of the packet, theTCAM logic 134 uses the logic key to look into the TCAM table for acontext index 135 to thepacket buffer context 131 associated with the packet fragment. The found content index provides an offset to thebuffer 107 where apacket buffer context 131 for the incoming packet fragments for the packet are stored. - Once a
context index 135 for a correspondingpacket buffer context 131 of an incoming packet fragment is found, the packet fragment sequence number is used to find the offset for that packet fragment in thepacket buffer context 131 in thereassembly buffer 107, and to store the packet fragment in that offset in thepacket buffer context 131. As such, the sequence number of the packet fragments is an offset into thepacket buffer context 131 associated with the packet fragment. - Storing the packet fragment includes linking the packet fragment into the corresponding
packet context buffer 131 based on theindex 135 into thereassembly buffer 107, using the sequence number of the packet fragments act as offset into thecontext buffer 131. As such the packet fragment header is removed, and the packet fragment is linked into thepacket context buffer 131 as the packet is reassembled. A count of the packet fragments for each packet context buffer is maintained, wherein the entire packet is considered reassembled when the required packet fragment count for the packet is reached. At this point egress processing for the assembled packet can begin. In the above lookup logic, the algorithm complexity for lookup into the TCAM is O(1). - An example application is in general purpose computing handling of packets in TCP/IP for IP packet fragmentation and reassembly. A client device executes a browser, and connects to a server for data. Data from the browser is in IP packets, wherein each IP packet is segmented into packet fragments by switches. The packet fragments arrive at the server as packet fragments, wherein the server reassembles TCP fragments into packets.
- Ingress processing (e.g.,
segmentation system 100S) creates packet fragments from packets and adds redundancy check, such as CRC, to each packet fragment before transport on network. A packet fragment coming into egress processing (e.g.,reassembly system 100R) is checked for errors, such as by checking encoding, before the packet fragment is used for reassembly. If errors are detected, then error correction (e.g., forward error correction or backward error correction) corrects the errors in a packet fragment before reassembly. TCAM lookup logic can also detect errors in an incoming packet fragment in egress processing. -
FIG. 5A shows a flowchart of segmentation (fragmentation)packet processing logic 150, according to an embodiment of the invention. According to an embodiment of the invention, one or more processing blocks of thelogic 150 may be implemented in one or more servers, NICs, devices and/or switches in a distributed system. - In a fragmentation (segmentation) phase, in a device (e.g.,
segmentation system 100S ofNIC 111 inFIG. 3B ), process block 151 comprises receiving an IP packet IPp for transmission, process block 152 comprises determining an egress port, and process block 153 comprises determining Maximum Transfer Unit (MTU) size of the egress port, wherein MTU controls maximum number of bytes in one packet (e.g., 1518 bytes including IP header, packet payload) egressing out of a NIC.Process block 154 comprises determining if the Total Length of IPp is greater than MTU. If Total Length of IPp is greater than MTU, the process proceeds to process block 155 for fragmenting the IPp packet, otherwise the packet is not fragmented and the process stops. -
Process block 155 comprises determining for that packet the Total Number of Fragments (Total Length INTEGER DIVISION BY MTU)+(Total Length MODULO DIVISION BY MTU? 1:0). In this example, (Total Length INTEGER DIVISION BY MTU) provides a whole integer value for the total number of fragments. The remaining bytes from the total length would be accommodated in the last fragment. (Total Length MODULO DIVISION BY MTU) provides the remaining bytes from the total length after dividing by MTU. If the remaining bytes are 0 that last fragment is not needed. As such, (Total Length MODULO DIVISION BY MTU? 1:0) returns 0. If (Total Length MODULO DIVISION BY MTU) provides a non-zero number, then (Total Length MODULO DIVISION BY MTU? 1:0) returns 1. -
Process block 156 comprises determining Last Fragment Size=Total Length MOD MTU.Process block 157 comprises obtaining a new frame buffer.Process block 158 comprises copying IP header of the IPp packet to the new frame buffer.Process block 159 comprises determining Fragment Offset=N+1, wherein N=0 to (Total number of fragments−1). - In
process block 160, if (N<Total number of fragments−1), then in the frame a More Fragment bit is set to 1, else that bit is set to 0. Inprocess block 161, if (N<Total number of fragments−1), then next payload of <MTU> size is copied from the original packet to the frame buffer, otherwise the last remaining portion of payload of size <Last Fragment Size> is copied to the frame buffer. - In
process block 162, Fragment Offset of the new packet is set to a value of N. Inprocess block 163, all Options are copied to the new buffer, and a new CRC is calculated over the header. Inprocess block 163, if ((N<Total number of fragments−1), then N=N+1 and proceed to process block 157, else stop fragmentation process for the packet. The frames comprise fragments of the IPp packet transmitted through theswitch 110 to a destination (e.g., Server B inFIG. 3B ). - Generally reassembly comprises receiving a packet fragment at the NIC. If as first member fragment, if More Fragments bit is 1 and Fragment Offset is valid, forward packet for reassembly. Packet Context identifies packet fragments of same identification number with Don't Fragment bit set to 0, Fragment Offset of non-zero number, More Fragment Bit set to 1 or 0, and all the other header parameters except CRC being exactly same. A new context is obtained if required. All received fragments of a packet with the same Identification Number, Don't Fragment Bit set to 0, Fragment Offset incremental, are considered wherein all but one fragment has More Fragment Bit set to 1.
- All the other header parameters (e.g., Source IP, Destination IP, DSCP, etc.) are checked to be same in all the member fragments. Header CRC is excluded from the checking process. Payloads of all the member fragments are serialized based on fragment offset numbers in an incremental order. Member packet fragment payloads are combined as the reassembled payload of the IPp packet. An IP header may be appended to the reassembled payload (if required).
-
FIG. 5B shows a flowchart of reassemblypacket processing logic 170, according to an embodiment of the invention, in a reassembly phase in a device (e.g.,reassembly system 100R ofNIC 112 inFIG. 3B ).Process block 171 comprises maintaining a reassembly table in a content addressable memory, wherein the reassembly table includes one or more entries corresponding to one or more packets, and wherein each entry comprises a logic key for a corresponding packet and a content index into a reassembly buffer area for storing incoming member packet fragments of that packet. -
Process block 172 handles a SOP packet fragment of a packet. In response to receiving an incoming member packet fragment of a packet that is a SOP packet fragment or if the packet fragment lookup key is not found in the reassembly table (i.e., a non-SOP packet fragment if it arrives ahead of others, out of order) of a packet, process block 172 generates a new logic key using selected information from the SOP (or the received out of order non-SOP) packet fragment header, wherein the selected information is the same for all member packet fragments of the packet.Process block 172 further allocates an area of the reassembly buffer for storing member packet fragments of the packet, and places a new entry into the reassembly table, wherein the new entry includes said new logic key and a new content index into the reassembly buffer area for storing incoming member packet fragments of that packet. -
Process block 172 also starts a reassembly timer for this context. The packet is reassembled using the stored member packet fragments in the reassembly buffer area for the packet using packet fragment offset number or sequence number from packet fragment header. The packet fragment offset number with respect to the packet is unique for each member packet fragment. The packet fragment offset number or sequence number is not included in the reassembly key formation. -
Process block 174 comprises receiving a successive incoming member packet fragment of a packet from a network wherein each member packet fragment comprises a segment of the packet and a header.Process block 175 comprises generating a reassembly key using selected information from the incoming member packet fragment header wherein the selected information is the same for all member packet fragments of the packet.Process block 176 comprises checking a reassembly table in a content addressable memory to find an entry that includes a logic key matching the reassembly key. -
Process block 177 comprises using a content index in the found entry and a sequence number of the incoming member packet fragment within the packet, to determine a location offset in a reassembly buffer area for storing the incoming member packet fragment at said location offset in the reassembly buffer area for the packet for reassembly.Process block 178 comprises checking if a member packet fragment count has been reached. If yes, process proceeds to block 179, otherwise the process proceeds to block 180.Process block 179 comprises reassembling the stored member packet fragments into a packet when a count is reached which indicates all member packet fragments of the packet are present. -
Decision block 180 checks if a reassembly timer timed out. If all the packet fragments associated to a packet do not arrive within a certain time period starting from receiving the first packet fragment, then in process block 173 the logic declares the reassembly error and clearsreassembly context 132,context index 135 and reassembly buffers 131. Otherwise the process proceeds to block 174 for next member packet fragment of the packet. - Other implementations of the invention are possible. In one embodiment, the
packet processing system 100 may be implemented in thecomputer system 15. In another embodiment, thecomputer system 15 includes apacket processing system 100 and theserver 11 includes a packet processing system. In another embodiment, thesegmentation system 100S of thepacket processing system 100 may be implemented in thecomputer system 15 and thereassembly system 100R of thepacket processing system 100 may be implemented in theserver 11. In another embodiment,segmentation system 100S of thepacket processing system 100 may be implemented in theserver 11, and thereassembly system 100R of thepacket processing system 100 may be implemented in thesystem 15. - The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
- The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
- It should be emphasized that the above-described embodiments of the present invention, particularly, any “preferred” embodiments, are merely possible examples of implementations, merely set forth for a clear understanding of the principles of the invention.
- Many variations and modifications may be made to the above-described embodiment(s) of the invention without departing substantially from the spirit and principles of the invention. All such modifications and variations are intended to be included herein within the scope of this disclosure and the present invention and protected by the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/619,283 US8923299B2 (en) | 2012-09-14 | 2012-09-14 | Segmentation and reassembly of network packets |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/619,283 US8923299B2 (en) | 2012-09-14 | 2012-09-14 | Segmentation and reassembly of network packets |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140079076A1 true US20140079076A1 (en) | 2014-03-20 |
US8923299B2 US8923299B2 (en) | 2014-12-30 |
Family
ID=50274411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/619,283 Active 2032-12-12 US8923299B2 (en) | 2012-09-14 | 2012-09-14 | Segmentation and reassembly of network packets |
Country Status (1)
Country | Link |
---|---|
US (1) | US8923299B2 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140161061A1 (en) * | 2012-12-10 | 2014-06-12 | Xg Technology, Inc. | Hybrid arq system using a sliding purge window for wireless networks |
US20140330977A1 (en) * | 2013-05-06 | 2014-11-06 | Jeroen van Bemmel | Stateless recognition of keep-alive packets |
US8942258B2 (en) | 2012-09-14 | 2015-01-27 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US20150049640A1 (en) * | 2013-08-19 | 2015-02-19 | Power-All Networks Limited | Data transmission controlling device and method for controlling data transmission |
US20150063367A1 (en) * | 2013-09-03 | 2015-03-05 | Broadcom Corporation | Providing oversubscription of pipeline bandwidth |
US20160261408A1 (en) * | 2015-03-02 | 2016-09-08 | Salesforce.Com, Inc. | Systems and methods for securing data |
US20170111294A1 (en) * | 2015-10-16 | 2017-04-20 | Compass Electro Optical Systems Ltd. | Integrated folded clos architecture |
WO2017108179A1 (en) * | 2015-12-22 | 2017-06-29 | Giesecke & Devrient Gmbh | Method for transferring transmission data from a transmitter to a receiver for processing the transmission data and means for carrying out the method |
US9743315B2 (en) * | 2013-03-15 | 2017-08-22 | Trane International Inc. | Method of fragmenting a message in a network |
CN109218201A (en) * | 2017-06-30 | 2019-01-15 | 华为技术有限公司 | A kind of method, controller and network equipment generating forwarding-table item |
US10291527B2 (en) | 2014-12-11 | 2019-05-14 | Hewlett Packard Enterprise Development Lp | Fragmented packet processing resource determination |
US10701188B2 (en) * | 2015-05-11 | 2020-06-30 | Fujitsu Limited | Transfer device, communication system and communication method |
US11240706B2 (en) * | 2017-10-08 | 2022-02-01 | Qualcomm Incorporated | Methods and systems for segmentation of positioning protocol messages |
US11368292B2 (en) | 2020-07-16 | 2022-06-21 | Salesforce.Com, Inc. | Securing data with symmetric keys generated using inaccessible private keys |
US11522686B2 (en) | 2020-07-16 | 2022-12-06 | Salesforce, Inc. | Securing data using key agreement |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11329927B2 (en) * | 2020-06-30 | 2022-05-10 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Automatic MTU configuration on a L2 domain |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6704794B1 (en) * | 2000-03-03 | 2004-03-09 | Nokia Intelligent Edge Routers Inc. | Cell reassembly for packet based networks |
US6781992B1 (en) * | 2000-11-30 | 2004-08-24 | Netrake Corporation | Queue engine for reassembling and reordering data packets in a network |
US20050074001A1 (en) * | 2002-11-12 | 2005-04-07 | Cisco Technology, Inc. | System and method for local packet transport services within distributed routers |
US20060002386A1 (en) * | 2004-06-30 | 2006-01-05 | Zarlink Semiconductor Inc. | Combined pipelined classification and address search method and apparatus for switching environments |
US20060026378A1 (en) * | 2004-07-27 | 2006-02-02 | Somsubhra Sikdar | Array machine context data memory |
US20060039379A1 (en) * | 2004-08-03 | 2006-02-23 | Fujitsu Limited | Processing method of fragmented packet and packet transfer equipment using the same |
US20060106946A1 (en) * | 2004-10-29 | 2006-05-18 | Broadcom Corporation | Method and apparatus for hardware packets reassembly in constrained networks |
US20060155875A1 (en) * | 2000-07-10 | 2006-07-13 | Cheriton David R | Hierarchical associative memory-based classification system |
US20060179156A1 (en) * | 2005-02-08 | 2006-08-10 | Cisco Technology, Inc. | Multi-threaded packeting processing architecture |
US20060274742A1 (en) * | 2005-06-07 | 2006-12-07 | Fong Pong | Adaptive cache for caching context and for adapting to collisions in a session lookup table |
US20070195761A1 (en) * | 2006-02-21 | 2007-08-23 | Cisco Technology, Inc. | Pipelined packet switching and queuing architecture |
US7447777B1 (en) * | 2002-02-11 | 2008-11-04 | Extreme Networks | Switching system |
US7643486B2 (en) * | 2000-02-14 | 2010-01-05 | Cisco Technology, Inc. | Pipelined packet switching and queuing architecture |
US8218538B1 (en) * | 2004-02-13 | 2012-07-10 | Habanero Holdings, Inc. | Storage gateway configuring and traffic processing |
US8243618B2 (en) * | 2010-04-26 | 2012-08-14 | International Business Machines Corporation | Steering fragmented IP packets using 5-tuple based rules |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5446726A (en) | 1993-10-20 | 1995-08-29 | Lsi Logic Corporation | Error detection and correction apparatus for an asynchronous transfer mode (ATM) network device |
KR100864889B1 (en) | 2007-03-13 | 2008-10-22 | 삼성전자주식회사 | Device and method for tcp stateful packet filter |
KR101034389B1 (en) | 2009-04-22 | 2011-05-16 | (주) 시스메이트 | Signature searching method according to signature location in packet |
US8942258B2 (en) | 2012-09-14 | 2015-01-27 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
-
2012
- 2012-09-14 US US13/619,283 patent/US8923299B2/en active Active
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7643486B2 (en) * | 2000-02-14 | 2010-01-05 | Cisco Technology, Inc. | Pipelined packet switching and queuing architecture |
US6704794B1 (en) * | 2000-03-03 | 2004-03-09 | Nokia Intelligent Edge Routers Inc. | Cell reassembly for packet based networks |
US20060155875A1 (en) * | 2000-07-10 | 2006-07-13 | Cheriton David R | Hierarchical associative memory-based classification system |
US6781992B1 (en) * | 2000-11-30 | 2004-08-24 | Netrake Corporation | Queue engine for reassembling and reordering data packets in a network |
US7447777B1 (en) * | 2002-02-11 | 2008-11-04 | Extreme Networks | Switching system |
US20080198854A1 (en) * | 2002-11-12 | 2008-08-21 | Cisco Technology, Inc. | System and method for local packet transport services within distributed routers |
US20050074001A1 (en) * | 2002-11-12 | 2005-04-07 | Cisco Technology, Inc. | System and method for local packet transport services within distributed routers |
US20110019670A1 (en) * | 2002-11-12 | 2011-01-27 | Cisco Technology, Inc. | System and method for local packet transport services within distributed routers |
US8218538B1 (en) * | 2004-02-13 | 2012-07-10 | Habanero Holdings, Inc. | Storage gateway configuring and traffic processing |
US20060002386A1 (en) * | 2004-06-30 | 2006-01-05 | Zarlink Semiconductor Inc. | Combined pipelined classification and address search method and apparatus for switching environments |
US20060026378A1 (en) * | 2004-07-27 | 2006-02-02 | Somsubhra Sikdar | Array machine context data memory |
US20060039379A1 (en) * | 2004-08-03 | 2006-02-23 | Fujitsu Limited | Processing method of fragmented packet and packet transfer equipment using the same |
US20060106946A1 (en) * | 2004-10-29 | 2006-05-18 | Broadcom Corporation | Method and apparatus for hardware packets reassembly in constrained networks |
US20060179156A1 (en) * | 2005-02-08 | 2006-08-10 | Cisco Technology, Inc. | Multi-threaded packeting processing architecture |
US20060274742A1 (en) * | 2005-06-07 | 2006-12-07 | Fong Pong | Adaptive cache for caching context and for adapting to collisions in a session lookup table |
US20070195777A1 (en) * | 2006-02-21 | 2007-08-23 | Tatar Mohammed I | Pipelined packet switching and queuing architecture |
US20070195773A1 (en) * | 2006-02-21 | 2007-08-23 | Tatar Mohammed I | Pipelined packet switching and queuing architecture |
US20080117913A1 (en) * | 2006-02-21 | 2008-05-22 | Tatar Mohammed I | Pipelined Packet Switching and Queuing Architecture |
US20070195778A1 (en) * | 2006-02-21 | 2007-08-23 | Cisco Technology, Inc. | Pipelined packet switching and queuing architecture |
US20070195761A1 (en) * | 2006-02-21 | 2007-08-23 | Cisco Technology, Inc. | Pipelined packet switching and queuing architecture |
US20110064084A1 (en) * | 2006-02-21 | 2011-03-17 | Tatar Mohammed I | Pipelined packet switching and queuing architecture |
US8243618B2 (en) * | 2010-04-26 | 2012-08-14 | International Business Machines Corporation | Steering fragmented IP packets using 5-tuple based rules |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10581761B2 (en) * | 2012-09-14 | 2020-03-03 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US8942258B2 (en) | 2012-09-14 | 2015-01-27 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US20190356610A1 (en) * | 2012-09-14 | 2019-11-21 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US20170302596A1 (en) * | 2012-09-14 | 2017-10-19 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US20150078389A1 (en) * | 2012-09-14 | 2015-03-19 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US9774547B2 (en) * | 2012-09-14 | 2017-09-26 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US11005785B2 (en) * | 2012-09-14 | 2021-05-11 | International Business Machines Corporation | Segmentation and reassembly of network packets for switched fabric networks |
US20140161061A1 (en) * | 2012-12-10 | 2014-06-12 | Xg Technology, Inc. | Hybrid arq system using a sliding purge window for wireless networks |
US10098037B2 (en) | 2013-03-15 | 2018-10-09 | Trane International Inc. | Method of fragmenting a message in a network |
US9743315B2 (en) * | 2013-03-15 | 2017-08-22 | Trane International Inc. | Method of fragmenting a message in a network |
US9560172B2 (en) * | 2013-05-06 | 2017-01-31 | Alcatel Lucent | Stateless recognition of keep-alive packets |
US20140330977A1 (en) * | 2013-05-06 | 2014-11-06 | Jeroen van Bemmel | Stateless recognition of keep-alive packets |
US20150049640A1 (en) * | 2013-08-19 | 2015-02-19 | Power-All Networks Limited | Data transmission controlling device and method for controlling data transmission |
US9338105B2 (en) * | 2013-09-03 | 2016-05-10 | Broadcom Corporation | Providing oversubscription of pipeline bandwidth |
US20150063367A1 (en) * | 2013-09-03 | 2015-03-05 | Broadcom Corporation | Providing oversubscription of pipeline bandwidth |
US10291527B2 (en) | 2014-12-11 | 2019-05-14 | Hewlett Packard Enterprise Development Lp | Fragmented packet processing resource determination |
US20160261408A1 (en) * | 2015-03-02 | 2016-09-08 | Salesforce.Com, Inc. | Systems and methods for securing data |
US10541811B2 (en) * | 2015-03-02 | 2020-01-21 | Salesforce.Com, Inc. | Systems and methods for securing data |
US10701188B2 (en) * | 2015-05-11 | 2020-06-30 | Fujitsu Limited | Transfer device, communication system and communication method |
US20170111294A1 (en) * | 2015-10-16 | 2017-04-20 | Compass Electro Optical Systems Ltd. | Integrated folded clos architecture |
RU2708031C1 (en) * | 2015-12-22 | 2019-12-03 | Гизеке+Девриент Каренси Текнолоджи Гмбх | Method of transmitting transmitted data from transmitting device to receiving device for processing transmitted data, as well as apparatus for realizing method |
WO2017108179A1 (en) * | 2015-12-22 | 2017-06-29 | Giesecke & Devrient Gmbh | Method for transferring transmission data from a transmitter to a receiver for processing the transmission data and means for carrying out the method |
CN108370354A (en) * | 2015-12-22 | 2018-08-03 | 捷德货币技术有限责任公司 | Method and apparatus for carrying out the method for transmission data to be transferred to the receiver for handling transmission data from transmitter |
US11456974B2 (en) | 2015-12-22 | 2022-09-27 | Giesecke+Devrient Currency Technology Gmbh | Method for transferring transmission data from a transmitter to a receiver for processing the transmission data and means for carrying out the method |
CN109218201A (en) * | 2017-06-30 | 2019-01-15 | 华为技术有限公司 | A kind of method, controller and network equipment generating forwarding-table item |
US11071017B2 (en) | 2017-06-30 | 2021-07-20 | Huawei Technologies Co., Ltd. | Forwarding entry generation method, controller, and network device |
US11665595B2 (en) | 2017-06-30 | 2023-05-30 | Huawei Technologies Co., Ltd. | Forwarding entry generation method, controller, and network device |
US11240706B2 (en) * | 2017-10-08 | 2022-02-01 | Qualcomm Incorporated | Methods and systems for segmentation of positioning protocol messages |
US11812301B2 (en) | 2017-10-08 | 2023-11-07 | Qualcomm Incorporated | Methods and systems for segmentation of positioning protocol messages |
US11368292B2 (en) | 2020-07-16 | 2022-06-21 | Salesforce.Com, Inc. | Securing data with symmetric keys generated using inaccessible private keys |
US11522686B2 (en) | 2020-07-16 | 2022-12-06 | Salesforce, Inc. | Securing data using key agreement |
Also Published As
Publication number | Publication date |
---|---|
US8923299B2 (en) | 2014-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8923299B2 (en) | Segmentation and reassembly of network packets | |
US8681819B2 (en) | Programmable multifield parser packet | |
EP3035613B1 (en) | Ccn routing using hardware-assisted hash tables | |
US7243284B2 (en) | Limiting number of retransmission attempts for data transfer via network interface controller | |
EP3142325B1 (en) | Network named fragments in a content centric network | |
US8799507B2 (en) | Longest prefix match searches with variable numbers of prefixes | |
US7650429B2 (en) | Preventing aliasing of compressed keys across multiple hash tables | |
US20220345423A1 (en) | Generation of descriptive data for packet fields | |
US11005785B2 (en) | Segmentation and reassembly of network packets for switched fabric networks | |
US20050281281A1 (en) | Port input buffer architecture | |
US20060034283A1 (en) | Method and system for providing direct data placement support | |
US10133760B2 (en) | Hardware for a bitmap data structure for efficient storage of heterogeneous lists | |
US20060265517A1 (en) | Tcp/ip reception process circuit and semiconductor integrated cirtuit having the same | |
US20220045950A1 (en) | Single lookup entry for symmetric flows | |
CN113490927A (en) | RDMA transport with hardware integration and out-of-order placement | |
US20070022225A1 (en) | Memory DMA interface with checksum | |
US7441179B2 (en) | Determining a checksum from packet data | |
US7610440B2 (en) | Content addressable memory with automated learning | |
US11451585B2 (en) | Anti-spoof check of IPv4-in-IPv6 fragments without reassembly | |
US20230409514A1 (en) | Transaction based remote direct memory access | |
US11044197B2 (en) | System and method for protecting resources using network devices | |
US11765102B2 (en) | Network device and conversion apparatus | |
CN117579547A (en) | Message routing acceleration method, device, main equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAMBLE, KESHAV G.;LEU, DAR-REN;MENDON, CHANDARANI J.;AND OTHERS;SIGNING DATES FROM 20120621 TO 20120814;REEL/FRAME:028963/0400 |
|
AS | Assignment |
Owner name: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD., SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:034194/0353 Effective date: 20140926 Owner name: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD., Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:034194/0353 Effective date: 20140926 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: LENOVO INTERNATIONAL LIMITED, HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.;REEL/FRAME:037101/0969 Effective date: 20151112 |
|
AS | Assignment |
Owner name: LENOVO INTERNATIONAL LIMITED, HONG KONG Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNMENT DOCUMENT CONTAINING TYPO ERRORS PREVIOUSLY RECORDED AT REEL: 037101 FRAME: 0969. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.;REEL/FRAME:037689/0190 Effective date: 20151211 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
AS | Assignment |
Owner name: LENOVO INTERNATIONAL LIMITED, HONG KONG Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE LTD.;REEL/FRAME:050300/0570 Effective date: 20150101 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |